gitea源码

webauthn.go 4.2KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142
  1. // Copyright 2018 The Gitea Authors. All rights reserved.
  2. // SPDX-License-Identifier: MIT
  3. package security
  4. import (
  5. "errors"
  6. "net/http"
  7. "strconv"
  8. "time"
  9. "code.gitea.io/gitea/models/auth"
  10. user_model "code.gitea.io/gitea/models/user"
  11. wa "code.gitea.io/gitea/modules/auth/webauthn"
  12. "code.gitea.io/gitea/modules/log"
  13. "code.gitea.io/gitea/modules/session"
  14. "code.gitea.io/gitea/modules/setting"
  15. "code.gitea.io/gitea/modules/web"
  16. "code.gitea.io/gitea/services/context"
  17. "code.gitea.io/gitea/services/forms"
  18. "github.com/go-webauthn/webauthn/protocol"
  19. "github.com/go-webauthn/webauthn/webauthn"
  20. )
  21. // WebAuthnRegister initializes the webauthn registration procedure
  22. func WebAuthnRegister(ctx *context.Context) {
  23. if user_model.IsFeatureDisabledWithLoginType(ctx.Doer, setting.UserFeatureManageMFA) {
  24. ctx.HTTPError(http.StatusNotFound)
  25. return
  26. }
  27. form := web.GetForm(ctx).(*forms.WebauthnRegistrationForm)
  28. if form.Name == "" {
  29. // Set name to the hexadecimal of the current time
  30. form.Name = strconv.FormatInt(time.Now().UnixNano(), 16)
  31. }
  32. cred, err := auth.GetWebAuthnCredentialByName(ctx, ctx.Doer.ID, form.Name)
  33. if err != nil && !auth.IsErrWebAuthnCredentialNotExist(err) {
  34. ctx.ServerError("GetWebAuthnCredentialsByUID", err)
  35. return
  36. }
  37. if cred != nil {
  38. ctx.HTTPError(http.StatusConflict, "Name already taken")
  39. return
  40. }
  41. _ = ctx.Session.Delete("webauthnRegistration")
  42. if err := ctx.Session.Set("webauthnName", form.Name); err != nil {
  43. ctx.ServerError("Unable to set session key for webauthnName", err)
  44. return
  45. }
  46. webAuthnUser := wa.NewWebAuthnUser(ctx, ctx.Doer)
  47. credentialOptions, sessionData, err := wa.WebAuthn.BeginRegistration(webAuthnUser, webauthn.WithAuthenticatorSelection(protocol.AuthenticatorSelection{
  48. ResidentKey: protocol.ResidentKeyRequirementRequired,
  49. }))
  50. if err != nil {
  51. ctx.ServerError("Unable to BeginRegistration", err)
  52. return
  53. }
  54. // Save the session data as marshaled JSON
  55. if err = ctx.Session.Set("webauthnRegistration", sessionData); err != nil {
  56. ctx.ServerError("Unable to set session", err)
  57. return
  58. }
  59. ctx.JSON(http.StatusOK, credentialOptions)
  60. }
  61. // WebauthnRegisterPost receives the response of the security key
  62. func WebauthnRegisterPost(ctx *context.Context) {
  63. if user_model.IsFeatureDisabledWithLoginType(ctx.Doer, setting.UserFeatureManageMFA) {
  64. ctx.HTTPError(http.StatusNotFound)
  65. return
  66. }
  67. name, ok := ctx.Session.Get("webauthnName").(string)
  68. if !ok || name == "" {
  69. ctx.ServerError("Get webauthnName", errors.New("no webauthnName"))
  70. return
  71. }
  72. // Load the session data
  73. sessionData, ok := ctx.Session.Get("webauthnRegistration").(*webauthn.SessionData)
  74. if !ok || sessionData == nil {
  75. ctx.ServerError("Get registration", errors.New("no registration"))
  76. return
  77. }
  78. defer func() {
  79. _ = ctx.Session.Delete("webauthnRegistration")
  80. }()
  81. // Verify that the challenge succeeded
  82. webAuthnUser := wa.NewWebAuthnUser(ctx, ctx.Doer)
  83. cred, err := wa.WebAuthn.FinishRegistration(webAuthnUser, *sessionData, ctx.Req)
  84. if err != nil {
  85. if pErr, ok := err.(*protocol.Error); ok {
  86. log.Error("Unable to finish registration due to error: %v\nDevInfo: %s", pErr, pErr.DevInfo)
  87. }
  88. ctx.ServerError("CreateCredential", err)
  89. return
  90. }
  91. dbCred, err := auth.GetWebAuthnCredentialByName(ctx, ctx.Doer.ID, name)
  92. if err != nil && !auth.IsErrWebAuthnCredentialNotExist(err) {
  93. ctx.ServerError("GetWebAuthnCredentialsByUID", err)
  94. return
  95. }
  96. if dbCred != nil {
  97. ctx.HTTPError(http.StatusConflict, "Name already taken")
  98. return
  99. }
  100. // Create the credential
  101. _, err = auth.CreateCredential(ctx, ctx.Doer.ID, name, cred)
  102. if err != nil {
  103. ctx.ServerError("CreateCredential", err)
  104. return
  105. }
  106. _ = ctx.Session.Delete("webauthnName")
  107. _ = ctx.Session.Set(session.KeyUserHasTwoFactorAuth, true)
  108. ctx.JSON(http.StatusCreated, cred)
  109. }
  110. // WebauthnDelete deletes an security key by id
  111. func WebauthnDelete(ctx *context.Context) {
  112. if user_model.IsFeatureDisabledWithLoginType(ctx.Doer, setting.UserFeatureManageMFA) {
  113. ctx.HTTPError(http.StatusNotFound)
  114. return
  115. }
  116. form := web.GetForm(ctx).(*forms.WebauthnDeleteForm)
  117. if _, err := auth.DeleteCredential(ctx, form.ID, ctx.Doer.ID); err != nil {
  118. ctx.ServerError("GetWebAuthnCredentialByID", err)
  119. return
  120. }
  121. ctx.JSONRedirect(setting.AppSubURL + "/user/settings/security")
  122. }